Author of the publication

NFV and Blockchain Enabled 5G for Ultra-Reliable and Low-Latency Communications in Industry: Architecture and Performance Evaluation.

, , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5595-5604 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of the state-of-the-art dynamic web services composition techniques., , and . IJWGS, 2 (2): 148-166 (2006)A Mobility-Aware Optimal Resource Allocation Architecture for Big Data Task Execution on Mobile Cloud in Smart Cities., , , , and . IEEE Communications Magazine, 56 (2): 110-117 (2018)Guest Editorial for Special Section on IEEE Haptic Audio Visual Environments and Games 2010., , and . IEEE Trans. Instrumentation and Measurement, 60 (11): 3498-3500 (2011)Software Defined Network-Based Multi-Access Edge Framework for Vehicular Networks., , , , , and . IEEE Access, (2020)AI-Skin : Skin Disease Recognition based on Self-learning and Wide Data Collection through a Closed Loop Framework., , , , , and . CoRR, (2019)Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer approach., , , , , , , and . Concurr. Comput. Pract. Exp., 27 (10): 2637-2655 (2015)SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , and . Concurr. Comput. Pract. Exp., (2018)Ant-based service selection framework for a smart home monitoring environment, , , and . Multimedia Tools and Applications, (2012)10.1007/s11042-012-1006-3.Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks., , , , and . IEEE Trans. Ind. Informatics, 14 (2): 799-813 (2018)An Energy-efficiency Node Scheduling Game Based on Task Prediction in WSNs., , , , and . Mob. Networks Appl., 20 (5): 583-592 (2015)